Information Security Tips

January 2017 - Looking forward: 2017's top threat prediction

As we look back on the past year's challenges, we also look ahead to which cybersecurity challenges will hold prominence in 2017. The Center for Internet Security (CIS) posted a Twitter poll asking respondents to choose which of the four listed threat areas would be the biggest cyber threat in 2017. The Internet of Things (IoT) took the top spot as biggest threat by a large margin. This shouldn't be a surprise given some of the prominent cyber attacks of 2016, including one which temporarily stopped some users from accessing popular websites such as Twitter, Spotify and Amazon, were bolstered by compromised IoT devices.

Here are some quick primers on why these are threats to everyday users, and how you can work to protect yourself out there in the connected world.

Internet of Things (IoT): Our top polling threat, the Internet of Things is comprised of everyday objects and household items that are connected to the Internet. Examples include smart TVs, routers, smart thermostats, and smart home devices among many others. Although convenient, these devices often come out of the box with very few security features, little to no security support, and often remain in use with default passwords in users' homes. As a result, these compromised devices can be used to attack others, slowing your Internet access and possibly preventing access to popular sites like Twitter, Amazon, and Spotify etc. When purchasing and using IoT or connected home devices, be sure to change the default passwords that come pre-loaded on the device to strong and unique ones of your choosing, and also keep up-to-date on patches and updates as they become available. Basic recommendations for creating a strong password are to use at least 10 characters including uppercase and lowercase letters, numbers, and symbols. Further information on setting a strong password is available in the guide linked at the end of this newsletter.

Data Dump Re-use: With the number of high profile data breaches the past year at well-known organizations, this will continue to be an important area of concern moving forward. Cyber criminals sell or publicly post stolen usernames, passwords, social security numbers and other personal information. Unfortunately, many people tend to re-use the same login credentials between many of their accounts due to the difficulty of remembering multiple passwords. This can allow cyber criminals to take their stolen credentials and attempt using them to access their other online banking, shopping, and other accounts. Users should follow the linked guide below to create and protect strong, unique passwords to avoid this type of compromise.

APT: Advanced Persistent Threat (APT) refers to cyber threat actors operating for or on behalf of nation-state governments like Russia and China, who are looking to compromise, steal, change, or destroy information for the purposes of espionage, disruption, or destruction. State and local governments, critical infrastructure, universities, and the employees of all of these entities are targeted by this threat. Users can reduce the risk from this type of threat actor by using strong and unique passwords, regularly patching their computers and devices, and thinking twice before opening suspicious emails/attachments or clicking links. More information on suspicious emails is located in the guide linked below.

Ransomware: Ransomware is a form of malware that aims to block a user from having access to their own systems, commonly by encrypting the infected computer's files against the owner's will. Once access is blocked, the ransomware then requests money (a ransom) in order to restore access. Cyber criminals are commonly spreading this particular malware through malicious email attachments. This highly prevalent form of malware can be mitigated by keeping your systems and anti-virus software patched and up to date with the most recent versions. Additionally, be wary of suspicious emails and do not open attachments or click on links from untrusted sources.

Consider some of the cyber threats out there as you go forward into 2017, and consider these tips for protecting you and your devices. Have a safe and happy new year, both on and offline!

The information provided in the monthly Security Tips newsletters is intended to increase the security awareness of an organization's end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization's overall information security posture.

Copyright Information

These tips are brought to you in the Commonwealth of Virginia by the Virginia Information Technologies Agency in coordination with:

VITA provides content in several formats that require software in addition to your browser to view. If you have problems accessing a file on this site, links to the needed software are below. All required software products (except the non-trial version of WinZip) are free to use.